Instant Download Distributed Denial of Service Attacks Real World Detection and Mitigation 1st Edition İlker Özçelik PDF All Chapters
Instant Download Distributed Denial of Service Attacks Real World Detection and Mitigation 1st Edition İlker Özçelik PDF All Chapters
Instant Download Distributed Denial of Service Attacks Real World Detection and Mitigation 1st Edition İlker Özçelik PDF All Chapters
com
https://textbookfull.com/product/distributed-
denial-of-service-attacks-real-world-detection-
and-mitigation-1st-edition-ilker-ozcelik/
https://textbookfull.com/product/optimization-in-the-real-world-
toward-solving-real-world-optimization-problems-1st-edition-katsuki-
fujisawa/
textbookfull.com
https://textbookfull.com/product/distributed-real-time-architecture-
for-mixed-criticality-systems-1st-edition-hamidreza-ahmadian-editor/
textbookfull.com
https://textbookfull.com/product/digital-technologies-sustainable-
innovations-for-improving-teaching-and-learning-1st-edition-demetrios-
sampson/
textbookfull.com
Proceedings of the 41st International Conference on
Advanced Ceramics and Composites 1st Edition Waltraud M.
Kriven Et Al. (Eds.)
https://textbookfull.com/product/proceedings-of-the-41st-
international-conference-on-advanced-ceramics-and-composites-1st-
edition-waltraud-m-kriven-et-al-eds/
textbookfull.com
https://textbookfull.com/product/translation-humour-and-literature-
translation-and-humour-delia-chiaro/
textbookfull.com
https://textbookfull.com/product/the-hermetic-tree-of-life-2nd-
edition-william-r-mistele/
textbookfull.com
https://textbookfull.com/product/soil-plant-and-atmosphere-concepts-
processes-and-applications-klaus-reichardt/
textbookfull.com
Distributed Denial of
Service Attacks
Distributed Denial of
Service Attacks
Real-world Detection and Mitigation
Richard R. Brooks
Professor
Holcombe Department of Electrical and Computer Engineering
Clemson University
İlker Özçelik
Assistant Professor
Department of Computer Engineering
Recep Tayyip Erdogan University
MATLAB R is a trademark of The MathWorks, Inc. and is used with permission. The Mathworks does not
warrant the accuracy of the text or exercises in this book. This book’s use or discussion of MATLAB R
software or related products does not constitute endorsement or sponsorship by The MathWorks of a par-
ticular pedagogical approach or particular use of the MATLAB R software.
Reasonable efforts have been made to publish reliable data and information, but the author and publisher
cannot assume responsibility for the validity of all materials or the consequences of their use. The authors
and publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any future
reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans-
mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or
contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-
8400. For works that are not available on CCC please contact [email protected]
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Typeset in CMR
by Nova Techset Private Limited, Bengaluru & Chennai, India
Dedication
This book is the result of many years of research on Distributed Denial of Service DDoS
attacks. A number of students have helped along the way. These included undergraduates,
M. S., and Ph. D. students at Penn State and Clemson Universities. All were advised
or co-advised by Dr. Brooks. Other students of note include Dr. Chris Griffin (Ph.D.
Penn State), Ms. Chinar Dingankar (M.S. Clemson), Ms. Devaki Shah (B. S. Penn State),
and Dr. Glenn Carll (Ph.D. Penn State). We would like to thank Mr. Jim Bottum and
Dr. Kevin McKenzie of Clemson University CCIT who allowed us to utilize Clemson Uni-
versity resources in this work. They both have a clear vision that sees the university’s role
in supporting faculty research. The vast majority of the work in this book was done by
Dr. Özçelik. Dr. Özçelik’s studies at Clemson were supported by the Turkish government.
Both Dr. Brooks and Dr. Özçelik have been fortunate to have supportive students, work
environments and families during this work.
v
In Loving Memory of My Father
Mustafa Özçelik
Your determination taught me to never give up.
To My Wife Jacqui and Our Sons Ömer James and Ali Joseph
Your love, patience and support made this book possible.
Love y’all.
Contents
Foreword xv
Acknowledgments xix
Preface xxi
Contributors xxiii
1 Introduction 1
1.1 Performance Testing and Analysis of DDoS Detection Approaches . . . . . 2
1.2 Deceiving DDoS Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 DDoS Mitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2 What is DDoS? 5
2.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2.1 Resource Saturation . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2.1.1 System/Device Resources . . . . . . . . . . . . . . . . . . . 8
2.2.1.2 Network Bandwidth . . . . . . . . . . . . . . . . . . . . . . 9
2.2.2 Exploiting Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2.3 Tampering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.2.4 Misuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.2.4.1 Fragmentation and Reassembly . . . . . . . . . . . . . . . . 15
2.2.4.2 TCP-based . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.2.4.3 Low and Slow Attacks . . . . . . . . . . . . . . . . . . . . . 18
2.2.4.4 Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.4.5 Others . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.2.5 Physical Destruction . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.3 Botnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.3.1 Botnet Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.3.2 Botnet Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.3.2.1 Star . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.3.2.2 Multi-server . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.3.2.3 Hierarchical . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.3.2.4 Random . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.3.3 Botnet Resilience and CnC Resolution . . . . . . . . . . . . . . . . . 30
2.3.3.1 IP Flux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.3.3.2 Domain Flux . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.3.3.3 Blind Proxy Redirection . . . . . . . . . . . . . . . . . . . . 33
vii
viii Contents
3.4 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.5 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
3.6 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4 Legal Considerations 67
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.2 Laws against DDoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
4.3 Jurisdiction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.4 DDoS Liability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.5 Protest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
4.6 Cyberwar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
4.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
4.8 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
4.9 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
15 Conclusion 319
15.1 Analysis and Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
15.2 Suggestions for Future Research . . . . . . . . . . . . . . . . . . . . . . . . 320
15.3 Final Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
16 Appendix 323
Xingsi Zhong and Oluwakemi Ade Aina
16.1 Generate TCP Traffic with Ostinato . . . . . . . . . . . . . . . . . . . . . . 323
16.2 Mininet Quick Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
16.2.1 Mininet Quick Hands-On . . . . . . . . . . . . . . . . . . . . . . . . 327
16.2.1.1 Install Mininet . . . . . . . . . . . . . . . . . . . . . . . . . 327
16.2.1.2 Access Mininet VM . . . . . . . . . . . . . . . . . . . . . . 328
16.2.1.3 Start and Stop Mininet . . . . . . . . . . . . . . . . . . . . 328
xiv Contents
Bibliography 347
Index 391
Foreword
This book started with empirical experiments exploring how DDoS attacks work in the real
world. We were lucky that Clemson University Chief Information Security Officer (Dr. Kevin
McKenzie) and Chief Information Officer (Mr. Jim Bottum) were dedicated to supporting
university faculty performing research. This created fertile soil, which we are grateful for.
This book concentrates on studying, understanding, and minimizing the impact of Dis-
tributed Denial of Service (DDoS) attacks. We used this text to teach a DDoS special topics
course three times. This course is a permanent offering in the Holcombe Department of Elec-
trical and Computer Engineering at Clemson University. There are several motivations for
this course:
1. DDoS is an ongoing problem in network security. The number and volume of
DDoS attacks is growing;
2. Several members of our faculty had expressed interest in adding to our curriculum
a course that integrated computer networks and security;
3. The DDoS topic is technically and socially interesting;
4. DDoS is used by several different attackers for different reasons, including: gov-
ernments to stifle dissent, companies to weaken their competition, criminals to
blackmail victims, and activists to show their anger;
5. DDoS is at the intersection of network design, performance, and security, which
allows us to deepen the student’s understanding in all of these domains with one
course; and
6. Our research projects provided us with sufficient depth and insight to present a
unique experience to our students.
This course fits neatly into networking and security curricula. Students should acquire
important networking skills and improve their understanding of how to design, monitor,
and manage networks.
Effort has been taken to make this book accessible, but it is a university level technical
textbook for graduate students of computer science and/or engineering. Technical details are
provided. This book is not a superficial overview. The contents of this book can be valuable
for working engineers, technologists, researchers, and interested parties. The information
given should be useful for readers willing to invest effort. It is not suited for non-technical
readers or leisure reading.
xv
About the Authors
Dr. Brooks’ background includes managing computer networks that span continents, per-
forming sponsored research, and teaching university classes. His research has been sponsored
by both government and industry, including:
• The Office of Naval Research (ONR),
• The Air Force Office of Scientific Research (AFOSR),
Dr. Özçelik’s background includes both researching network security and teaching uni-
versity classes in the electrical engineering program. He has organized many cyber security
awareness workshops and has given speeches to attendees from both government agencies
and private industries in Turkey. He also served as a member of the Cyber Security Working
Group at the Council of Higher Education in Turkey and Information and the Cyber Secu-
rity National Science and Advisory Board at Information Security Association of Turkey.
Dr. Özçelik has a B.S. in Electronics and Communication Education from Marmara
University, M.S. in Electrical Engineering from the Syracuse University, and Ph.D. in Elec-
trical Engineering from the Holcombe Department of Electrical and Computer Engineering,
Clemson University.
He worked as an Assistant Professor with the Department of Electrical and Electronics
Engineering of Recep Tayyip Erdogan University for three years. He is currently an Assistant
Professor and Department of Computer Engineering at Recep Tayyip Erdogan University.
xvii
Acknowledgments
This material is based upon work supported by, or in part by, the National Science Founda-
tion grants CNS-1049765, OAC-1547245, CNS-1544910, OAC-1642143, Republic of Turkey
Ministry of National Education and The Scientific and Technological Research Council of
Turkey (TUBITAK).
The U.S. Government and the Turkish Government are authorized to reproduce and dis-
tribute reprints for Governmental purposes notwithstanding any copyright notation thereon.
The authors gratefully acknowledge this support and take responsibility for the contents of
this report.
The views and conclusions contained herein are those of the authors and should not be
interpreted as necessarily representing the official policies or endorsements, either expressed
or implied, of the National Science Foundation, The Scientific and Technological Research
Council of Turkey, Republic of Turkey Ministry of National Education, the Turkish Gov-
ernment or the U.S. Government.
The DDoS mitigation chapter extends work done by the eQualit.ie tech collective in
Montreal on the Deflect tool. eQualit.ie has worked with many civil society groups to protect
them from DDoS attacks. Our work benefited greatly from their willingness to share their
expertise, experience and technology. We thank them for their help.
The authors also gratefully acknowledge use of the services and facilities of the Sim-
Center, Center of Excellence in Applied Computational Science and Engineering at the
University of Tennessee at Chattanooga. The authors would also like to give a heartfelt
thanks to the Director of the SimCenter, Dr. Antony Skjellum.
xix
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
Preface
The Internet has become critical infrastructure. It is not only a critical backbone of our
communications infrastructure, but we depend on it for news, entertainment, and education.
In addition to that, smart grid control signals pass through the Internet; our financial
and commercial interactions depend on the Internet functioning; and emergency incident
response uses Internet infrastructure.
Reliance on Internet infrastructure has come about because of the numerous advantages
in terms of convenience, efficiency, and reliability that the Internet provides. Unfortunately,
our reliance on the Internet has a dark side. Once we rely on a system, some people can
take advantage of that dependence. Many reasons exist for disrupting the Internet; they
include:
• Financial gain,
• Political reasons,
• Terror,
• Fun, or
• Censorship.
A full discussion of motivations and how they have changed over time is in Chapter 3.
In addition to there being many reasons for disrupting the network, it is relatively
1. easy to do,
2. hard to identify attackers, and
3. challenging to protect yourself against.
This results in an ongoing problem with economic and social impact.
This book is designed to support a course in Distributed Denial of Service (DDoS)
attacks, which helps students understand:
• how DDoS works,
• how DDoS attacks can be detected, and
• how these attacks can be mitigated.
The curriculum we provide includes a set of hands-on projects for students to execute
that will provide them with a combination of theoretical understanding and practical skills.
Chapter 14 explains how to put the necessary laboratory infrastructure in place. Chap-
ters 8, 9, and 10 contain most of the necessary exercises.
Skills that students will learn, include:
1. How to install IP networks,
2. How to monitor IP networks,
3. How Software Defined Networking (SDN) works,
4. How to evaluate DDoS detection results, and
5. How to set up a simple content distribution network to mitigate the impact of
DDoS attacks.
xxi
xxii Preface
The textbook starts with a definition of Denial of Service and a discussion of many of
the common tools used to cause them. We follow that by a historical discussion, which is
augmented by explanations of legal considerations.
Sometimes it is hard to distinguish between simple malfunctions and malicious activity.
Similarly, reasons for performing DDoS attacks vary. While extortion and blackmail are
clearly illegal, it could be unclear at what point a demonstration of displeasure moves from
legitimate protest to illegal destruction of property. We also note that legitimate protests
can have legal consequences.
Chapters are provided that give in depth discussion of some current DoS research topics.
These include the impact of DoS on control systems and the smart grid.
The course structure we follow uses Chapters 2 through 10 sequentially. The first few
chapters take less time to execute. They are readings and lectures. The chapters that are
based on in class exercises will take more time and should include time for student work to
be corrected.
Optionally, the instructor could include one of the in depth research chapters on either
control theory or the smart grid. These topics are particularly relevant given the growing
importance of the Internet of Things (IoT).
Contributors
xxiii
Random documents with unrelated
content Scribd suggests to you:
The Project Gutenberg eBook of Swedish fairy
tales
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.
Language: English
[1]
[Contents]
SWEDISH FAIRY TALES
BY
HERMAN HOFBERG.
TRANSLATED BY W. H. MYERS.
CHICAGO:
BELFORD-CLARKE CO.
1890.
[2]
[Contents]
COPYRIGHT BY
BELFORD, CLARKE & CO.
1888. [3]
[Contents]
Author’s Preface.
The illustrations are the product of several among our best artists.
Without doubt, the book has thereby been added to greatly, not only in
outer adornment, but even in national and intrinsic value. [4]
[Contents]
Translator’s Preface.
I have taken the liberty to leave out a number of the author’s notes as
unimportant, and not likely to interest the general reader, also to follow
the stories with their notes instead of grouping them in the back of the
book as in the original. [5]
[Contents]
Contents.
PAGE.
AUTHOR’S PREFACE, 3
TRANSLATOR’S PREFACE, 4
SKÅNE.
LJUNGBY HORN AND PIPE, 31
STOMPE PILT, 15
THE GHOST AT FJELKINGE, 28
THE GIANT FINN AND LUND’S CATHEDRAL, 17
THE LORD OF ROSENDAL, 20
THE MASTER OF UGERUP, 23
THE SURE SHOT, 11
BLEKINGE.
THE KNIGHT OF ELLENHOLM, 39
THE SWAN MAIDEN, 35
SMÅLAND.
DAME SOÅSAN, 47
EBBE SKAMELSON, 60
JOHAN AND THE TROLLS, 65
KATRINEHOLM MANOR, 55
KETTIL RUNSKE, 45
THE GIANT PUKE, 52
THE LOST TREASURE, 69
THE TROLLS OF SKURUGATA, 42
GÖTLAND.
THE BYSE, 77
THE SEA NYMPH, 75
THE TEN FAIRY SERVANTS, 71
ÖLAND. [6]
THE BRIDGE OVER KALMARSOUND, 78
HALLAND.
ELSTORPS WOODS, 84
THE FREEBOOTER’S GRAVE, 89
THE PIGMY OF FOLKARED’S CLIFF, 86
THE YOUNG LADY OF HELLERUP, 80
BOHUSLÄN.
GLOSHED’S ALTAR, 95
HÅLDE-HAT, 99
KING RANE AND QUEEN HUDTA, 107
THE BRIDAL PRESENT, 97
THE CHILD PHANTOM, 105
THE GIANT MAIDEN IN BORÅSERÖD MOUNTAIN, 91
THE GOLDEN CRADLE, 102
VESTERGÖTLAND.
BISHOP SVEDBERG AND THE DEVIL, 117
THE COUNTESS OF HÖJENTORP, 111
THE GIANT OF SKALUNDA, 113
THE KNIGHTS OF ÅLLABERG, 109
THE TREASURE IN SÄBY CREEK, 119
THE TROLLS IN RESSLARED, 115
ÖSTERGÖTLAND.
LADY BARBRO OF BROKIND, 129
THE CAT OF NORRHULT, 126
THE TOMTS, 122
THE TROLL SHOES, 134
THE URKO OF NORTH WIJ, 131
DAL.
BURIED ALIVE, 140
THE MOUNTAIN KITCHEN, 138
THE WOOD AND THE SEA NYMPHS, 136
VERMANLAND. [7]
JONAS SPITS, 141
LADY RANGELA OF EDSHOLM, 143
SAXE OF SAXEHOLM, 145
THE HARVESTERS, 149
THE POLITE COAL BURNER, 147
NÄRIKE.
KATE OF YSÄTTER, 155
RUGGA BRIDGE, 153
THE ELVES’ DANCE, 159
THE FIDDLER AND THE SEA NYMPH, 162
THE ULFGRYT STONES, 150
VESTERMANLAND.
BOLSTRE CASTLE, 174
THE COAL BURNER AND THE TROLL, 169
THE SNIPE, 164
TIBBLE CASTLE AND KLINTA SPRING, 166
SÖDERMANLAND.
LAKE GOLDRING, 184
THE CHANGELINGS, 176
THE LADY OF PINTORP, 179
THE TROLL GARDEN AT STALLSBACKE, 187
UPLAND.
HERR MELKER OF VECKHOLM, 189
THE OLD MAN OF LOGGA, 192
DALARNE.
BÖLSBJÖRN, 197
THE LAPP IN MAGPIE FORM, 200
THE PLAGUE, 203
THE TREASURE SEEKERS, 198
THE WATER NYMPH, 194
GESTRIKLAND.
THE VÄTTERS, 205
HELSINGLAND.
FORSSA CHURCH, 208
MEDELPAD.
STARKAD AND BALE, 209
ÅNGERMANLAND. [8]
THE BELL IN SJÄLEVAD, 212
HERJEDALEN.
THE VÄTTS STOREHOUSE, 214
JÄMTLAND.
THE STONE IN GRÖNAN DAL, 216
VESTERBOTTEN.
THE VOYAGE IN A LAPP SLED, 218
LAPPLAND.
KADNIHAK, 227
THE CUNNING LAPP, 224
THE GIANT’S BRIDE, 221
THE LAPP GENESIS OR THE FIRST OF MANKIND, 219
[9]
[Contents]
List of Illustrations.
PAGE.
[11]
[Contents]
The Sure Shot. 1
“I will wager you that I need go no farther than the door to shoot him
for you,” persevered the watchman in defiant tones.